Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it increasingly easy to mimic, manipulate and manufacture biometry. As the world becomes more reliant on biometric authentication, it’s vital that we understand how it’s being threatened, what…

How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution of malware-related threats is like a sine wave movement, re-infused by new technology developments,” Christiaan Beek, Lead Scientist and Senior Principal Engineer, McAfee, told Help Net…

High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps

Expert testing of iOS and Android mobile applications shows that in most cases, insecure data storage is the most common security flaw in mobile apps. Positive Technologies’ yearly report, Vulnerabilities and Threats in Mobile Applications 2019, found that critical vulnerabilities are slightly more common in Android applications, compared to their iOS counterparts (43% vs. 38%)….

Florida City Pays $600,000 Ransom to Save Computer Records

The Riviera Beach City Council voted unanimously this week to pay the hackers’ demands, believing the Palm Beach suburb had no choice if it wanted to retrieve its records, which the hackers encrypted. The council already voted to spend almost $1 million on new computers and hardware after hackers captured the city’s system three weeks…

IoT explodes worldwide, researchers investigate security issues present in the devices real users own

About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, bringing with it an associated growth in cybersecurity risks. The findings have been published in a new research paper “All Things Considered: An Analysis of IoT…

Organizations more likely to accelerate business when protecting their cloud data

Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability and cost-effectiveness enabled by the use of cloud services, according to McAfee. With an increasing amount of sensitive data stored in the cloud, organizations are also finding challenges in managing…

Employees in the UK expressed greater understanding of privacy laws, and better training opportunities, than those in the U.S., the ObserveIT survey reveals. The survey polled 1,000 full-time employees in the United States and United Kingdom to determine their understanding of their organizations’ current privacy regulations. New policies and regulations dictating organizations’ handling of sensitive…